We’re still talking about the mouse cursor, right?
We’re still talking about the mouse cursor, right?
I do know from experience that networks are complicated and users are dumb, but I still think that if someone with barely any knowledge and without malicious intent can mess with your network then something’s wrong with the setup.
But if the bio or art major can seriously affect your network then is that even their fault? What if someone had skill and malicious intent?
If someone deploys their router using a uni network as wan then I don’t see how that could affect other uni network users? I can imagine some internal services might not work behind such a router but it would be illogical of the user to blame anyone but themselves.
Can you give some examples of issues you mention?
Believe it or not a lot of people here (including me) had no knowledge about that issue before this announcement was posted.
And my comment is referring to one very specific “thread” from your comment. Yes, you’re discussing other issues in your comment, but they’re at best only vaguely related to that first sentence.
Try reading some current information on it.
Oh no no no, we don’t play that game here. If you’re trying to convince someone of your argument, the burden of providing reputable and scientifically accurate evidence is on YOU and you only.
And only if the other side won’t accept scientific evidence then you can blame them.
I’m not saying cats can’t be vegan but to the best of my knowledge their diet must be meat based. As it is you who are trying to convince me (and others) cats can be vegan, it is also you who must provide the evidence.
Sorry mate, those figures with no meaningful captions are borderline incomprehensible. Like, what’s the difference between first and second figure?
It is undoubtedly a new piece of research, but the cause is always the same: corporations exploit people because they are taken out of government and democratic control effectively everywhere.
Some corporations employ more people and have bigger budgets than some countries and they often influence people’s lives more than the government. Yet they’re effectively electoral monarchies where electors and monarchs are just a bunch of rich assholes who respond to nobody.
Only when we change that system then those headlines will stop.
I create tables every day for run-of-the-mill stuff that simply doesn’t need a database. No one has time for that.
It seems that your issue isn’t the lack of tables in sheets but no easy way to create a simple db.
If we want to break Microsoft’s monopoly than we can’t do that by reimplementing Microsoft’s monopolistic ecosystem. And that creates the opportunity to correct questionable and arbitrary Microsoft decisions.
People are used to MS Office now but so were they used to typewriters a few decades ago. And if we’re changing OSes we don’t have to stick to one office suite.
I strongly disagree. The porn is a huge issue, but there are a lot of actually useful websites where kids and teens can learn about their interests. Gatekeeping all that knowledge would make young people significantly less knowledgeable
I’m genuinely curious where their penny picking went? All of tech companies shove ads into our throats and steal our privacy justifying that by saying they operate at loss and need to increase income. But suddenly they can afford spending huge amounts on some shit that won’t give them any more income. How do they justify it then?
One issue with “hacky” methods suggested here I can see is they might disable eCall in the EU. And eCall is actually a safety improvement so for some it might be a very suboptimal compromise. But maybe if enough people show resistance to uncontrolled data collection then some meaningful legislation will be passed.
Drives are usually encrypted with symmetric ciphers (usually AES) and these are reasonably secure against quantum attacks with a key big enough.
And with the vast majority of crimes you just need to wait until the statute of limitations, which in cryptography and quantum fields is quite short period.
No more secrets.
Post-quantum cryptography enters the chat
Can’t it be used to “replace” the arms? US ships to India so India can ship to Russia without losing?
CC (not sure about MIT) virtually always requires attribution, but as GitHub Copilot showed right now open-“media” authors have basically no way of enforcing their rights.
DaVinci provides Linux binaries
I know it was different times, but if my kid was so afraid of not doing homework to the point of breaking into the house through the basement window, I would consider it a huge failure on my side.
Interesting. Ubuntu/PopOS screenshot tool freezes the screen upon hitting the button. Unfortunately it doesn’t have the cursor feature